New attribute-based authentication and its application in anonymous cloud access service

被引:12
|
作者
Li, Jin [1 ,2 ]
Chen, Xiaofeng [2 ]
Huang, Xinyi [3 ]
机构
[1] Guangzhou Univ, Dept Comp Sci, Guangzhou 510500, Guangdong, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[3] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350117, Peoples R China
基金
国家教育部博士点专项基金资助; 中国国家自然科学基金;
关键词
authentication; signer privacy; batch verification; access control; cloud computing; BATCH VERIFICATION; MULTI-AUTHORITY; SIGNATURE; ENCRYPTION;
D O I
10.1504/IJWGS.2015.067161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure access control service in cloud computing has attracted much attention recently. Attribute-based signature (ABS for simplicity) is one of important cryptographic notions which can be utilised to realise anonymous authentication and access control in cloud computing. In this paper, we propose an efficient ABS with multiple authorities that can be proved with strong signer privacy and unforgeability. Signer privacy is enhanced due to the anonymous key-issuing protocol used in our scheme, that is, (a) the identity of signer is kept anonymous without revocation among all users whose attributes satisfying the predicate given in the signature; (b) the user can get the attribute private key while preventing the authorities from linking attributes of the user. In addition, our scheme supports batch verification, which greatly improves the verification efficiency.
引用
收藏
页码:125 / 141
页数:17
相关论文
共 50 条
  • [1] Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting
    Li, Peng
    Lai, Junzuo
    Wu, Yongdong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] Server-aided anonymous attribute-based authentication in cloud computing
    Liu, Zhusong
    Yan, Hongyang
    Li, Zhike
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 61 - 66
  • [3] Efficient Anonymous Attribute-Based Encryption with Access Policy Hidden for Cloud Computing
    Huang, Chanying
    Yan, Kedong
    Wei, Songjie
    Zhang, Gongxuan
    Lee, Dong Hoon
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 266 - 270
  • [4] Anonymous decentralized attribute-based access control for cloud-assisted IoT
    Nasiraee, Hassan
    Ashouri-Talouki, Maede
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 : 45 - 56
  • [5] k-Times Attribute-Based Anonymous Access Control for Cloud Computing
    Yuen, Tsz Hon
    Liu, Joseph K.
    Au, Man Ho
    Huang, Xinyi
    Susilo, Willy
    Zhou, Jianying
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) : 2595 - 2608
  • [6] Traceable Hierarchical Attribute-based Authentication for the Cloud
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 685 - 689
  • [7] Attribute-based authentication on the cloud for thin clients
    Ibrahim, Maged Hamada
    Kumari, Saru
    Das, Ashok Kumar
    Odelu, Vanga
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 5813 - 5845
  • [8] Attribute-based authentication on the cloud for thin clients
    Maged Hamada Ibrahim
    Saru Kumari
    Ashok Kumar Das
    Vanga Odelu
    [J]. The Journal of Supercomputing, 2018, 74 : 5813 - 5845
  • [9] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing
    Liu, Xuejiao
    Xia, Yingjie
    Jiang, Shasha
    Xia, Fubiao
    Wang, Yanbo
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
  • [10] Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
    Jung, Taeho
    Li, Xiang-Yang
    Wan, Zhiguo
    Wan, Meng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) : 190 - 199